保護DataHogo
LearnFree ToolsBlogPricingWhy I Built ThisSign inGet Started
Back to all vulnerabilities

Project Config Best Practices

.env.example, security linting, git hooks, .gitignore, npm scripts security, lockfiles, and test data management.

7 vulnerabilities

No .env.example File

low

Without a .env.example file, new contributors don't know what environment variables are required, leading to insecure workarounds like hardcoding values.

CWE-1059

No Security Linting

low

Without security-focused ESLint rules, common vulnerabilities like XSS sinks, dangerouslySetInnerHTML, and eval() usage slip through code review.

CWE-1076A06:2021

No Git Security Hooks

low

Without pre-commit hooks that scan for secrets and security issues, developers can accidentally push API keys and passwords to the repository.

CWE-1059A02:2021

Inadequate .gitignore

medium

A .gitignore that doesn't cover .env files, build artifacts, and IDE configs can lead to secrets or sensitive data being accidentally committed.

CWE-540A02:2021

Insecure npm Scripts

medium

npm scripts that fetch and execute remote code, or that embed secrets as shell arguments, are a supply chain and credential exposure risk.

CWE-78A06:2021

Missing Lockfile (Project Config)

medium

A project without a committed lockfile can install different dependency versions on each machine, making builds non-reproducible and supply chain attacks harder to detect.

CWE-1104A06:2021

Hardcoded Test Data

low

Test files with hardcoded real email addresses, phone numbers, or production-like credentials can leak PII and create security confusion.

CWE-798A02:2021
保護DataHogo

Product

  • Security Scanner
  • Security for Vibecoders
  • Snyk Alternative
  • Pricing

Resources

  • Learn
  • Free Tools
  • Blog

Company

  • Why I Built This
  • Terms
  • Privacy

© 2026 Data Hogo. All rights reserved.